ram

Results 1 - 25 of 2769Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
    
SAP
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
IDC considera que RR. HH. es responsable de abordar y entregar los elementos clave de la transformación digital, así como de cambiar la función de RR. HH. en sí. Para ayudar a las organizaciones en este proceso, IDC ha identificado cinco tendencias y acciones claves que apoyan la transformación digital y el desarrollo de RR. HH. Esta herramienta permite a los profesionales de RR. HH. entender las hojas de ruta de entregas para lograr estos objetivos de transformación claves, empezando hoy mismo.
Tags : 
    
SAP SuccessFactors
Published By: Workday Spain     Published Date: Sep 20, 2018
Hoy en día, la mayoría de las organizaciones carecen de acceso a herramientas de analytics y datos de toda la empresa que puedan utilizar de forma global. Y eso es un problema. Para tomar decisiones empresariales inteligentes y en el momento preciso, su organización debe poder acceder a los datos reales importantes, y debe poder hacerlo rápidamente. Lea el informe de CIO.com para descubrir: • La importancia de tener una fuente única y fiable de información para toda la empresa. • Cómo los sistemas cloud proporcionan datos en lo que puede confiar. • Por qué necesita datos procesables en tiempo real para mejorar la toma de decisiones.
Tags : 
    
Workday Spain
Published By: Workday DACH     Published Date: Sep 25, 2018
Ashley Goldsmith ist Chief People Officer bei Workday. Ihr obliegt die Verantwortung über das Personalwesen, die interne Kommunikation, das Global Impact-Programm, die Arbeitsplatzausstattung und die Workday Foundation. Bevor sie zu Workday kam, war Ashley Chief Human Resource Officer und Executive Vice President bei Polycom. Vor ihrer Zeit bei Polycom war sie Senior Vice President für Personalwesen, Unternehmenskommunikation sowie Environmental Health und Sicherheit der Sparte Tissue Diagnostics bei F. Hoffmann-La Roche. In dieser Bericht lesen sie über Ihre Erfahrung und Tips für HR-Führungskräfte.
Tags : 
    
Workday DACH
Published By: Workday DACH     Published Date: Sep 25, 2018
Stellen Sie sich eine Personalleiterin vor, die eine hoch effiziente HR-Abteilung führt: Als CHRO – oder vielleicht trägt sie auch den heute schon gängigen Titel „Chief Employee Experience Officer“ – nimmt sie in nicht allzu ferner Zukunft an einer Telefonkonferenz zu den Finanzergebnissen teil. Sie unterstützt den CEO darin, zu veranschaulichen, wie neu formierte Mitarbeiterprogramme zu dem jüngsten, positiv überraschenden Unternehmensgewinn beigetragen haben. Im Anschluss stellt die Personalchefin eine Verbindung zu einem modernen Virtuality-Reality-Konferenzraum in einem Tokioter Hotel her, um ein Pressebriefing zu geben. Sie bittet die Teilnehmer (mithilfe ihres „Hearable“- Übersetzers, der sie in Echtzeit dolmetscht und der nun von jedermann diskret im Ohr getragen wird) auf Japanisch, ihre kurze Verspätung zu entschuldigen, bevor sie ihre innovativen Pläne zur Schließung von Kompetenzlücken durch kontinuierliche Schulungen am Arbeitsplatz vorstellt, die auf die gesamte Asien- Paz
Tags : 
workday, workday technology, digital strategy
    
Workday DACH
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
    
Turbonomic
Published By: Carbon Black     Published Date: Oct 10, 2018
According to ESG Research, 65% of organizations believe the skill level of their security team could be improved, and 48% are using more than 25 security products. This leads to more overworked staff and, ultimately, less effective security. Download the Replace AV Buyer's Guide to learn what your team should look for when replacing legacy AV with an endpoint security solution that is easy to manage and deploy, and can cost-effectively protect your growing business. In this buyer's guide you'll find: A core evaluation checklist for replacing AV. Guiding questions to frame your evaluation to replace AV. How to run a test of next-generation AV solutions. Learn more about replacing your traditional AV in the Replace AV Buyer's Guide.
Tags : 
    
Carbon Black
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: ServiceNow     Published Date: Sep 18, 2018
When a global transportation logistics provider wanted to improve support for its global network of branch offices in the Americas, Europe, and Asia, it used performance analytics to monitor and analyze the organization’s support processes. Not only did performance analytics dramatically increase visibility—allowing the company to move from monthly reports to on-demand performance dashboards—it also uncovered major process bottlenecks. In one case, resolving a single bottleneck increased efficiency by 17%, making support far more responsive while saving hundreds of hours of effort. Discover how ServiceNow Performance Analytics can benefit your business by downloading this white paper.
Tags : 
performance, analytics, business, servicenow
    
ServiceNow
Published By: Excellus BlueCross BlueShield     Published Date: Oct 17, 2018
When it comes to protecting yourself against breast cancer, knowledge is power. This toolkit covers everything from warning signs and the importance of early detection to what you can expect during a mammogram.
Tags : 
breast cancer, breast cancer awareness, healthcare, health benefits, health, health plans, excellus bcbs, excellus, employee benefits, health insurance, mammograms
    
Excellus BlueCross BlueShield
Published By: Intouch Insight     Published Date: Jul 23, 2018
Customer experience (CX) is a top priority for most retailers, but many struggle to pinpoint where the brand vision for CX is not being delivered - especially at the individual store level.
Tags : 
    
Intouch Insight
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring
    
CareerBuilder
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Aug 09, 2008
ITIL provides a framework of customizable best practice initiatives that help organizations consistently deliver high-quality IT services. Effective ITIL implementation adds value to the IT infrastructure and improves business and service delivery.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail
Published By: Gigaom     Published Date: Oct 23, 2018
In this 1-hour GigaOm webinar, you will discover why Phishing Control is the most efficient method to protect systems and free up resources in your security programs arsenal.
Tags : 
area 1, cyber attacks, data protection, network protection, phishing, security, network security
    
Gigaom
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services
    
123Together
Published By: Tempworks Software     Published Date: Mar 17, 2012
Freemium is a feature-light version of our award-winning business software program, TempWorks Enterprise, that helps you manage hiring and sales processes.
Tags : 
    
Tempworks Software
Published By: Modicon PLC     Published Date: Dec 04, 2012
Our repair technicians are capable of repairing most Modicon - Schneider Electric parts same day. Our exchange program allows us to send you a remanufactured unit while allowing you 30 days to return the failed unit for a credit.
Tags : 
    
Modicon PLC
Published By: fitness pro world     Published Date: Dec 06, 2012
he rampant fad diets that seem to be here, there, and everywhere, can definitely help you to lose weight instantly, but the question is, how long can that weight loss be sustained, and what will it end up doing to your body.
Tags : 
    
fitness pro world
Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Ability Commerce     Published Date: May 18, 2009
It always surprises me that as eCommerce marketers we give lip service to the importance of testing, buy many of us don't take the time to fine-tune our email programs. If you are able to identify a few elements through testing that resonate with your customers and then employ those insights in your ongoing program, the improvements may be sustainable over time.
Tags : 
ability commerce, seo, email frequency, email test, lead generation, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library